Who Is Managing Our Data Assets?

Most organizations have people or teams to optimally manage their valuable corporate assets. Real estate teams manage and optimize the use of space.  IT manages the technology.  Same with inventory, cash and investments, and people resources. Even intangibles like patents and other intellectual property.  But…

Romania Police Arrest a Darknet Ransomware Gang of Five

Romanian police made their first ransomware related arrest in five years. According to Europol, the Romanian police responded to the call of rampant ransomware attacks and sales of hacked data on the Darknet, to go all out to arrest a gang of five. The gangs…

The Security Day at Cisco Live in Barcelona on 29th January

Every organisation has something valuable to protect and adversaries who want to get their hands on it. The challenge is that the struggle between the relentless attackers and the tireless defenders does not always seem to be evenly balanced. Attackers have unlimited resources and an…

Sun, Sand and Industrial Security

Across the United States, people are defrosting and starting to shovel their way out of January’s  Polar Vortex “bomb cyclone.” Even the state of Florida saw some chillier than usual temperatures. Florida has de-thawed now and next week security professionals from all-over head to South…

Darknet Dealers Caught for Shipping 500,000 Pills

In December, authorities arrested two California men for their participation in a massive opioid trafficking conspiracy that spanned the United States. The defendants, Andrew Tablack, a 26-year-old from Beverly Hills, California, and Stephan Durham, a 43-year-old from Altadena, California, allegedly shipped cyclopropyl fentanyl pills across…

MARK-TO-MARKET: 2018: Bitcoin: Hackers remain part of digital currencies

By now, holders of Bitcoin and other cryptocurrencies are accustomed to their massive price swings. In December, a two-week 81 percent surge in the price of a single Bitcoin was immediately followed by a five-day decline of 36 percent. Bitcoin’s meteoric rise in price, from…

Apple says Spectre and Meltdown vulnerabilities affect all Mac and iOS devices

(Ben Margot/Associated Press) Technology companies are working to protect their customers after researchers revealed that major security flaws affecting nearly every modern computer processor could allow hackers to steal stored data — including passwords and other sensitive information — on desktops, laptops, mobile phones and…

Introducing Exploit Prevention to Stop File-Less Attacks

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating…

Hoosier senator wants to prepare America for opportunities tied to artificial intelligence

INDIANAPOLIS — This story was written and edited by human beings using their education, training and experience to report on a newsworthy subject. But perhaps in the not-too-distant future, a similar article will be composed by a machine, guided by artificial intelligence, or AI, and…

Russia’s cyberwarfare attacks

The Russians are coming for our elections–to disrupt them, discredit them, and affect their outcome. They’ll be coming in 2018 and in 2020. Even if we figure out what they’re up to, our government may be unable or unwilling to stop it. That’s the conclusion…

Copyright © 2018 NETWORKFIGHTS.COM